“We have a very collected computer data,” said crook in an interview with Europe 1 radio, iTele TV channel and newspaper Le Monde, adding that 96 people participated in the attack.

“We have analyzed (data) … (it will) months, I hope it will not be for a few years, but we have very limited resources.”

Google, which says it fully complies with French law, has been under pressure in Europe from public opinion and governments angry at the way multinationals operate to reduce burdens their global presence.

India IT subcontractors promote “mini CEO” is capable of the companies themselves, while reducing down on the hordes of computer programmers denied they normally use as they try to squeeze more profit from their staff.

The relocation of Infosys Ltd and others is symptomatic of a mature industry that more revenue from its own IP instead of providing any labor, information wants more low margin and back office. For graduates that the $ 108 billion IT industry can be seen as a safe way to class modern India average cultivation, processing is disturbing. Dozens

industry aspirants who were recruited on campus by player # 4 HCL Technologies recently protested outside its offices in different cities. They offered jobs in 2011 before graduating last year, but have not seen the dates of assembly -. Wage slips or

“Best HR You were cooler … once,” read a sign carried by two protesters in a photo in the newspaper The Hindu.

Benefits and HCL December quarter sales increased, while the number declined – which is rare in an industry that has long been used for the linear relationship between enrollment and revenue growth .

only 20 percent of the recruits from 5000 to 6.000 campus jobs offered in HCL 2011 are incorporated as graduation last summer, HCL and said he did not d tenders in 2012 for students graduating in June 2013.

slower growth, less people increased customer demand for trained personnel, and increased productivity through automation and software pressuring all recruits, according to HCL, which has said it expects entry-level employees to bring on board accelerate in August. “It is not that the application does not exist. Different skills,” says Ajay Davessar, HCL head of external communications. “typical roles that a student thinks,” I’ll just go out and start coding, and have a good life “are tested with reality … Any candidate who is fresh or old, have the flexibility to applying the skills elsewhere. “

CODING coolies LESS ‘”

Tech Mahindra Ltd., the No. 5 player, 100 name of what he calls Mini-CEOs are given wide latitude to their parts of the business management.

“We are moving towards a situation like the developed economies, where we ask people to go deeper,” says Sujitha Karnad, who heads human resources at Tech Mahindra.

“We want architects of solutions here. We do not want the coolies coding Moreover, it is clear, “says Karnad, using a term commonly used in India, in collaboration with domestic staff.

Although many Indian office job back as the technical support, insurance claims processing or call center staff work, software services companies try to recover value, meaning less use of working time and personnel. The growth of turnover per employee in industry

up to 5 percent per year extend over the next two years by about 3 percent in the past five years, said Forrester Research analyst Frederic Giron. growth is expected to accelerate from 2015 as the accounts of labor based on intellectual property for a growing share of total , he said.

India

services increased significantly, due to the availability of skilled labor cost advantage erode wages and other costs are rising in India.

In the past it was profitable for IT companies to new graduates to hire by the thousands, and keeps one hand on the “bench” waiting for deployment on a client project. customers

But the budget-constrained now require shorter. IT vendors hired six months of before an anticipated contract currently working with a window in a month or two, Surabhi Mathur Gandhi said, first vice president Team Lease, a staffing consultant.

Traditionally, about 30 percent of the staff of the Indian IT industry services on the bench at some point, often in training, pending the deployment of client work. During the December quarter, about 70 percent of Infosys employees and less than 65 percent at number 3 provider Wipro is deployed on billable projects. At Tata Consultancy Services, the largest Indian IT services, the figure was 72 percent in this Ajoyendra Mukherjee, head of human resources, called the comfort zone of 70-74 percent utilization. “I think we can increase to 75, 76, “he said. other computer services company, iGate Corp., a future which provides only 10 percent of the staff to sit on the bench, said Srinivas Kandula, head of human resources, which predicts that the size of the bank, by 2 or 3 percentage points per year decline in the next five years.

Back-Up Plan

benches

shorter: a smaller share of employment is directly campus, and experienced professionals move to a competitor would be less willing to wait to be made and companies are reluctant to pay for it.

Also, companies are obliged

placements, particularly experienced with notice periods of three months and no buyout clauses , compared with periods of a notice period of one month earlier.

Under

forefront of companies who are more actively trying to nonlinear growth pushing where incomes are not limited by the size of the population, about 70 percent of employees are skilled workers, up from 60 percent in 2008, says Rajiv Srinivas, Associate Director at Tech Mahindra, which expects to about 90 percent in the next two or three years.

Infosys, while adding each quarter net employees increased from 4,906 persons in the area in March last year to 977 in the December quarter (excluding acquisition costs), lateral recruitment s is maintained at an average of 4,300 employees per quarter to December, in which the percentage of recruits on campus was much smaller.

“Previously the emphasis was more on your career … you find a job, you begin to learn and gain knowledge slowly over a period of time, “said Sunil Gupta, who joined Infosys as vice president of quality about six months after the ‘Indian unit of CGI Group Logica Plc .

“Today is the value of a professional judged by how fast you learn, how quickly you adapt and change with the environment,” he said.

young Indians who saw it as a ticket to the middle class, the change means that the path is less clear. Those that do not break and valuable skills remain in demand, but the days of young managers waving with five or more competing offers. But that does not necessarily translate into slower growth of wages. Mercer expects earnings in the industry to grow 12 percent this year, the same as 2012. Diversified economy in India, graduates have career more attractive, including multinationals, with a growing presence in India, such as Google Inc., which means that IT vendors are struggling to remain competitive. “We see IT companies as a backup,” said SS Jayaram, a student in the final year of engineering in Bangalore said he chose a job in India with Mu Sigma Inc., a rapid growth in the United States data analysis company, offers more than IBM and TCS.

Washington a “cyber Pearl atmosphere” consider a surprise attack from a formidable enemy that the power of the financial system of the country to disable or cripple the U.S. government could destroy.

But those on the front lines say it all not to government agencies and corporate networks to protect against a sudden attack. They say many infringements push both perhaps dozens of countries, as well as well-funded guerrillas and criminals qualified electronic. security officers and consultants say they are overwhelmed. The attacks are not only China that Washington has long been accused of spying on U.S. companies, many come from Russia, Eastern Europe, the Middle East and the Western countries. The authors of elite military units organized criminal networks in adolescents militants. “They spend more than us and they Outman in almost every way,” said an officer of Dell Inc. Chief Security Officer, John McClurg. “I can not remember in my life ‘adult, a difficult time.” The big fear is that one day, a large corporation or a government agency will be a serious disturbance and very costly to their business to make when hackers to steal data or damage critical infrastructure sabotage or destroy consumer confidence in the safety of their data. Elite security Mandiant Corp. Monday gave a 74-page report that a unit of Chinese soldiers steal data from more than 100 companies accused. While China was immediately denied these accusations, safety experts and others say Mandiant the hacker group is just one of more than 20 with origins in China. Chinese pirates

tend to large companies and technology companies the most innovative thing using e-mails that appear to come from trusted colleagues focus, but bear attachments marred by viruses, spyware and other malicious software, according to researchers western cyber.

Eastern European crime rings, meanwhile, use “drive-by downloads” to undermine popular websites like NBC.com last week visitors to infect. Although malware can vary but often include software for recording keystrokes that computer users passwords for financial accounts. Other

in the game are activists in the style of loosely affiliated group known as Anonymous, who are in favor of denial of service attacks and temporarily block websites from view and automated searches for common vulnerabilities a way to access information from the company.

An increasing number of countries weapons programs computer and electronic espionage finance, law enforcement officials said. The alleged involvement of the United States in the production of electronic direction, including Stuxnet, that the Iranian program to enrich uranium to hurt, is considered one of the most successful. Iran is also blamed for a series of extraordinarily effective denial of service attacks against major U.S. banks over the past six months that stopped their online banking sites. Iran is suspected of introducing at least one American oil company, two people familiar with the ongoing investigation told Reuters. “There is a battle looming in every direction you look,” said Jeff Moss, chief information security ICANN, a group that is part of the critical infrastructure manages Internet. ‘personal goals Everybody goes to the door when it’s just fire after fire, “said Moss, who also advises the U.S. Department of Homeland Security.

HUNDREDS unreported cases

Industry veterans say that the growth in the number of hackers, software tools at their disposal, and the part thriving underground economy to have any network connected to the Internet is impossible to perfectly defend.

“Your average engineer operational safety feels somewhat under fire, “said Bruce Murphy, director of Deloitte & Touche LLP, the study of labor safety.” It feels like Sisyphus rolling a stone on the hill and the hill keeps steeper. “

Three major U.S. newspapers, Apple Inc., Facebook Inc., Twitter and Microsoft Corp. have all admitted in February they had hacked. Inserted the malware on the computers of employees in technology has been detected in hundreds of other companies who have chosen to remain silent about the incident , two people familiar with the situation told Reuters.

ownership “I can not be a time when many companies were so clearly remember” “and were so unprepared,” says Adam O’Donnell, an officer of the company Security Sourcefire Inc., using slang for hackers access.

Instead of hype, cyber intrusion remain under-public â € leaks fear the attacks will spook investors?? head of the new attempt FBI cybercrime, Deputy Executive Director Richard McFeely said that the secret has become a major challenge.

“Our biggest problem at the moment is to the private sector to a level of comfort where they can report defects, malware, effects within their networks” said McFeely. ” It was very difficult with many large companies to get them to cooperate fully. “

McFeely said the FBI plans to open a deposit malware for sharing information between companies in the same sector to encourage. Obama also recently issued a decision on cybersecurity promotes cooperation. former head of the National Security Agency, Michael Hayden, supports the use of commercial and diplomatic channels to put pressure on countries of piracy as early a White House strategy announced Wednesday new

“The Chinese, with some legitimacy, will say: “.. you spying on us as the former Director of the NSA, I will say:” Yes, and we are better than you, “said Hayden, now director of security within the Chertoff Group, consultant

He said what worries him, moreover, c .. is the Chinese presence on networks that do not value intelligence as systems that infrastructure such as power plants and water have “There is no intellectual property there to be stolen, not trade secrets, not negotiating positions. So that scares you, because it seems to be preparing attacks, “said Hayden.

middle of the growing fear, many top professionals in the field in San Francisco on Monday to meet the conference’s most famous American industry security, the name of the host company EMC Corp. and RSA unit.

Several experts said they were convinced that companies spend money on the wrong things, such as antivirus subscriptions can not detect new attacks or directed.

RSA executive chairman Art Coviello and Francis de Souza, director of products with high provider Symantec Corp., Both have said they will be speeches calling for a focus on more advanced analysis instruments seeking unusual behavior the network?? seems expensive.

a more fundamental approach to the limitation of computer privileges for users, installing software updates quickly, and allowing only trusted applications to function correctly.

Some security companies are zero with new models, such as forcing all programs to their customers to carry on the wall of virtual machines to stop.

With these perspectives, so much money at stake, and the problems both years, may only two points of agreement.

Most people in the industry and the government thinks that things will get worse. Coviello, for its part, has predicted that the first genre – but relatively easy -. virus removed all data on tens of thousands of PCs to the company of national oil of Saudi Arabia last year was a harbinger of things to come

And more

say that public attention on cybersecurity, even if it solves uncomfortable on the failure of the industry and stubborn opponents, will lead to a debate desperately need doing internationally and at home.